S.NO |
Project Code |
JAVA Project Titles |
1 |
ENJ2401 |
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection |
2 |
ENJ2402 |
Improving Automated Bug Triaging with Specialized Topic Model |
3 |
ENJ2403 |
Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method |
4 |
ENJ2404 |
Transactional Behavior Verification in Business Process as a Service Configuration |
5 |
ENJ2405 |
A Credibility Analysis System for Assessing Information on Twitter |
6 |
ENJ2406 |
Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems |
7 |
ENJ2407 |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data |
8 |
ENJ2408 |
My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
9 |
ENJ2409 |
Privacy-Preserving Selective Aggregation of Online User Behavior Data |
10 |
ENJ2410 |
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions |
11 |
ENJ2411 |
Search Rank Fraud and Malware Detection in Google Play |
12 |
ENJ2412 |
Towards Detecting Compromised Accounts on Social Networks |
13 |
ENJ2413 |
iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence |
14 |
ENJ2414 |
An Overlay Architecture for Throughput Optimal Multipath Routing |
15 |
ENJ2415 |
FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control |
16 |
ENJ2416 |
Network Capability in Localizing Node Failures via End-to-End Path Measurements |
17 |
ENJ2417 |
Privacy and Integrity Preserving Top-fc Query Processing for TwoTiered Sensor Network |
18 |
ENJ2418 |
Routing in Accumulative Multi-Hop Networks |
19 |
ENJ2419 |
SWEET: Serving the Web by Exploiting Email Tunnels |
20 |
ENJ2420 |
Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model |
21 |
ENJ2421 |
A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption |
22 |
ENJ2422 |
Detecting Mobile Malicious Webpages in Real Time |
23 |
ENJ2423 |
Quantifying Interdependent Privacy Risks with Location Data |
24 |
ENJ2424 |
Searching Trajectories by Regions of Interest |
25 |
ENJ2425 |
SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks |
26 |
ENJ2426 |
A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT |
27 |
ENJ2427 |
An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy |
28 |
ENJ2428 |
Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services |
29 |
ENJ2429 |
Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems |
30 |
ENJ2430 |
SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud |
31 |
ENJ2431 |
NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media |
32 |
ENJ2432 |
Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers |
33 |
ENJ2433 |
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending |
34 |
ENJ2434 |
Automatic Generation of Social Event Storyboard from Image Click-through Data |
35 |
ENJ2435 |
Image Re-ranking based on Topic Diversity |
36 |
ENJ2436 |
Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement |
37 |
ENJ2437 |
An Iterative Classification Scheme for Sanitizing Large-Scale Datasets |
38 |
ENJ2438 |
Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach |
39 |
ENJ2439 |
Collaborative Filtering-Based Recommendation of Online Social Voting |
40 |
ENJ2440 |
Computing Semantic Similarity of Concepts in Knowledge Graphs |
41 |
ENJ2441 |
Detecting Stress Based on Social Interactions in Social Networks |
42 |
ENJ2442 |
Dynamic Facet Ordering for Faceted Product Search Engines |
43 |
ENJ2443 |
Efficient Clue-based Route Search on Road Networks |
44 |
ENJ2444 |
Efficient Keyword-aware Representative Travel Route Recommendation |
45 |
ENJ2445 |
Energy-efficient Query Processing in Web Search Engines |
46 |
ENJ2446 |
Generating Query Facets using Knowledge Bases |
47 |
ENJ2447 |
Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach |
48 |
ENJ2448 |
l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items |
49 |
ENJ2449 |
Mining Competitors from Large Unstructured Datasets |
50 |
ENJ2450 |
Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction |
51 |
ENJ2451 |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
52 |
ENJ2452 |
PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks |
53 |
ENJ2453 |
QDA: A Query-Driven Approach to Entity Resolution |
54 |
ENJ2454 |
Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data |
55 |
ENJ2455 |
RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem |
56 |
ENJ2456 |
SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors |
57 |
ENJ2457 |
Towards Real-Time, Country-Level Location Classification of Worldwide Tweets |
58 |
ENJ2458 |
Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling |
59 |
ENJ2459 |
Understand Short Texts by Harvesting and Analyzing Semantic Knowledge |
60 |
ENJ2460 |
User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective |
61 |
ENJ2461 |
User-Centric Similarity Search |
62 |
ENJ2462 |
When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks |
63 |
ENJ2463 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification |
64 |
ENJ2464 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
65 |
ENJ2465 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
66 |
ENJ2466 |
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users |
67 |
ENJ2467 |
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage |
68 |
ENJ2468 |
A robust reputation management mechanism in the federated cloud |
69 |
ENJ2469 |
Achieving Efficient and Secure Data Acquisition for Cloud- supported Internet of Things in Smart Grid |
70 |
ENJ2470 |
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data |
71 |
ENJ2471 |
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems |
72 |
ENJ2472 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
73 |
ENJ2473 |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
74 |
ENJ2474 |
Fast Phrase Search for Encrypted Cloud Storage |
75 |
ENJ2475 |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
76 |
ENJ2476 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
77 |
ENJ2477 |
Identity-Based Private Matching over Outsourced Encrypted Datasets |
78 |
ENJ2478 |
Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage |
79 |
ENJ2479 |
On the Security of Data Access Control for Multi-authority Cloud Storage Systems |
80 |
ENJ2480 |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
81 |
ENJ2481 |
Privacy Protection based Access Control Scheme in Cloud-based Services |
82 |
ENJ2482 |
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data |
83 |
ENJ2483 |
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud |
84 |
ENJ2484 |
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage |
85 |
ENJ2485 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
86 |
ENJ2486 |
Securing Cloud Data under Key Exposure |
87 |
ENJ2487 |
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud |
88 |
ENJ2488 |
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud |
89 |
ENJ2489 |
Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving |
90 |
ENJ2490 |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
91 |
ENJ2491 |
SocialQ&A: An Online Social Network Based Question and Answer System |
92 |
ENJ2492 |
Phishtester: Automatic Testing Of Phishing Attacks |
93 |
ENJ2493 |
Workflow Scheduling System Based On Hybrid Algorithm Qpso |
94 |
ENJ2494 |
Multi Codeword Ranked Pursuit Over Encrypted Data Using Trse |
95 |
ENJ2495 |
Online Workflow Scheduling System Based On Hybrid Algorithm Qpso |
96 |
ENJ2496 |
Online Passport Issuing System |
97 |
ENJ2497 |
Secure Online Voting Using Mac Address Verification |
98 |
ENJ2498 |
Relation database and spam detection |
99 |
ENJ2499 |
Credit card fraud detection using hidden markov model |
100 |
ENJ2500 |
Corporate recruitment system |
101 |
ENJ2501 |
E-fraud, state of the art and counter measures |
102 |
ENJ2502 |
Voice based automated transport enquiry system |
103 |
ENJ2503 |
Resilient online coverage for surveillance applications |
104 |
ENJ2504 |
Proxy server - design and implementation |
105 |
ENJ2505 |
Improving utilization of infrastructure clouds |
106 |
ENJ2506 |
Distributed cache updating for dynamic source routing protocol |
107 |
ENJ2507 |
Stealthy attacks in wireless ad hoc networks |
108 |
ENJ2508 |
Multiauctioneer progressive auction for dynamic spectrum access |
109 |
ENJ2509 |
Secure optimal cyclic cryptographic system |
110 |
ENJ2510 |
Continuous monitoring of distance-based range queries |
111 |
ENJ2511 |
Network analyzer and; network monitoring tool using snmp |
112 |
ENJ2512 |
Dynamic character and; pattern recognition using neural networks |
113 |
ENJ2513 |
Location aided routing in mobile adhoc networks for secured routing |
114 |
ENJ2514 |
Enabling public verifiability and data dynamics for storage security in cloud computing |
115 |
ENJ2515 |
Grid information retrieval system |
116 |
ENJ2516 |
Multiple routing configurations for fast ip network recovery |
117 |
ENJ2517 |
Data mining implementation for credit cards application processing system |
118 |
ENJ2518 |
Vertical market information providing system implementation |
119 |
ENJ2519 |
Material forecasting and management solution |
120 |
ENJ2520 |
Script identification through temporal sequence of the strokes |
121 |
ENJ2521 |
Pensioner system secured with bio – metric sensors |
122 |
ENJ2522 |
portfolio manager implementation |
123 |
ENJ2523 |
Inter office messaging system – ioms, office automation system |
124 |
ENJ2524 |
Web based matrimonial services, a desi matrimony web portal |
125 |
ENJ2525 |
Inter group communication of cued click points |
126 |
ENJ2526 |
Online body shopping system with auto mailing feature |
127 |
ENJ2527 |
Ntelli shopping cart and assistant system |
128 |
ENJ2528 |
Online VRS - vehicle reservation system |
129 |
ENJ2529 |
Distributed web service for on-line coursework submission |
130 |
ENJ2530 |
Document archival management system electronic archival design |
131 |
ENJ2531 |
Remote electricity billing system automation and implementation. |
132 |
ENJ2532 |
Dynamic college information system and; data integrity maintenance |
133 |
ENJ2533 |
Computerized system for extracting abstract from the given source document,abstract solutions |
134 |
ENJ2534 |
Customer acceptance of internet banking |
135 |
ENJ2535 |
E-career and consultancy service online |
136 |
ENJ2536 |
E-governance design and implementation system |
137 |
ENJ2537 |
E-approach and implementation of hotel management system |
138 |
ENJ2538 |
Online event management with featured install system |
139 |
ENJ2539 |
Online hospital info system with interactive services universal medical portal with adviser |
140 |
ENJ2540 |
Digital water marking for video piracy detection |
141 |
ENJ2541 |
Distributed file sharing system for peer to peer network |